• Title/Summary/Keyword: mobile computing

Search Result 1,916, Processing Time 0.038 seconds

Data Dissemination Protocol based on Predictable Mobility of Sinks in Wireless Sensor Networks (무선 센서 네트워크에서 예측 가능한 싱크 이동성을 기반으로 한 데이타 전달 프로토콜)

  • Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Choi, Young-Hwan;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.276-280
    • /
    • 2008
  • Many dissemination protocols on the mobility support in wireless sensor networks have been designed based on the assumption that the movement trace of sinks, such as soldiers and fire fighters, is random. However, the mobility of the sinks in many applications, for example, the movement trace of a soldier on operation in a battle field, can be determined in advance. In this paper, we propose a Predictable Mobility-based Data Dissemination protocol that enables data to directly route from source nodes to moving sinks by taking into consideration predictable movement behavior of the sinks. We also show the superiority of the predictable mobility-based data dissemination protocol through the performance comparison with the random mobility-based data dissemination protocols.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

The SAFE Management System Model Based on Context Automatic Awareness

  • Han, Kook-Hee;Liu, Yiwen;Kwon, Young-Jik;Kang, Byeong-Do
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.87-96
    • /
    • 2007
  • Ubiquitous is a Latin-derived word meaning "to exist at any time and place" like water or air. In computing, the word "ubiquitous" indicates an environment in which users have access to networks without any limitation regarding computer networks or places. Important issues in building Ubiquitous Korea (U-Korea) are the social problems appearing with a rapid increase in the old age population. Nowadays, with the rise of the nuclear family, the increase in the number of elderly people living alone, and the change in the status of women, both wives and husbands are employed outside the home, and the relatives who would be responsible for supporting the elderly sometimes are on long or short business trips, and it happens that old people can't be looked after. Therefore the government developed a wireless paging system for the sick, disabled, old and weak so that when an emergency happens, by just simply dialing 119, an emergency aid center could take prompt action. However, the present wireless paging systems composing the under-layer of the emergency aid information system have some problems, such as, a lack of reliability, problems among terminals, mobile transmitters and receiving terminals, the users' refusal to admit the need for the system and poor operational skills, administrators' perfunctory management and checks, etc. On account of these problems, the system efficiency has degraded and therefore a system upgrade is necessary. In this paper, we attempt to evaluate the newly implemented SAFE119 system, a new wireless paging system seeking to correct the problems of the current system.

  • PDF

Degree of autonomy for education robot (교육 보조 로봇의 자율성 지수)

  • Choi, Okkyung;Jung, Bowon;Gwak, Kwan-Woong;Moon, Seungbin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.67-73
    • /
    • 2016
  • With the rapid development of mobile services and the prevalence of education robots, robots are being developed to become a part of our lives and they can be utilized to assist teachers in giving education or learning to students. This standard has been proposed to define the degree of autonomy for education robot. The autonomy is an ability to perform a given work based on current state and sensor value without human intervention. The degree of autonomy is a scale indicating the extent of autonomy and it is determined in between 1 and 10 by considering the level of work and human intervention. It has been adapted as per standard and education robots can be utilized in teaching the students autonomously. Education robots can be beneficial in education and it is expected to contribute in assisting the teacher's education.

Implementation of 6LoWPAN Testbed: Location Tracking Service Based on Google Map (구글맵을 이용한 위치 추적 서비스를 제공하는 6LoWPAN 테스트베드 구현)

  • Kim, Kye-Won;Seo, Jae-Wan;Hwang, Dae-Joon;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.13-26
    • /
    • 2009
  • Wireless Sensor Networks (WSNs) is one of the key technologies that make it possible to provide u-service in a ubiquitous society, however, it has disadvantages such as difficulty of managing sensor nodes and weaknesses of stability or mobility in large-scale WSNs. In order to solve these problems, 6LoWPAN that integrates with WSNs and IP networks has been studied widely. In this paper, we propose a Location Tracking Service Based on Google Map (LTSGM) system using 6LoWPAN. Since LTSGM system provides visual location information of sensor nodes through Google Map, it is possible to makes it easier than ever to manage sensor nodes in large-scale WSNs. Moreover, LTSGM can be used for various services such as applications for disaster or crime because it can trace the location of mobile nodes. Implementation of LTSGM system will be a test platform for 6LoWPAN.

  • PDF

Finding high utility old itemsets in web-click streams (웹 클릭 스트림에서 고유용 과거 정보 탐색)

  • Chang, Joong-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.521-528
    • /
    • 2016
  • Web-based services are used widely in many computer application fields due to the increasing use of PCs and mobile devices. Accordingly, topics on the analysis of access logs generated in the application fields have been researched actively to support personalized services in the field, and analyzing techniques based on the weight differentiation of information in access logs have been proposed. This paper outlines an analysis technique for web-click streams, which is useful for finding high utility old item sets in web-click streams, whose data elements are generated at a rapid rate. Using the technique, interesting information can be found, which is difficult to find in conventional techniques for analyzing web-click streams and is used effectively in target marketing. The proposed technique can be adapted widely to analyzing the data generated in a range of computing application fields, such as IoT environments, bio-informatics, etc., which generated data as a form of data streams.

Design and Implementation of a HTMLtoVoiceXML Converter (HTMLtoVoiceXML 변환기의 설계 및 구현)

  • Choi, Hoon-il;Jang, Young-Gun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.559-569
    • /
    • 2001
  • It is possible to access web contents by mobile terminals and telephones due to the evolution of voice and VoiceXML technologies. Nevertheless, because these days most of all the web contents are constructed by HTML, it is impossible to access them by using the new technology. Therefore, to access the contents through voices requires the conversion of the web document from HTML to VoiceXML, but its manual conversion process should be involved additional time and expenditure. In this paper, we design and implement HTMLtoVoiceXML converter, suggest a system structure of it and propose a practical identification algorithm of meaningful fragmented group of contents to solve the problem. To test the performance and validity of the converter, we apply it to more than 400 web pages in Korean web sites, it works well except for web pages which involve invalid HTML codes.

  • PDF

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

Bio-mimetic Recognition of Action Sequence using Unsupervised Learning (비지도 학습을 이용한 생체 모방 동작 인지 기반의 동작 순서 인식)

  • Kim, Jin Ok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.9-20
    • /
    • 2014
  • Making good predictions about the outcome of one's actions would seem to be essential in the context of social interaction and decision-making. This paper proposes a computational model for learning articulated motion patterns for action recognition, which mimics biological-inspired visual perception processing of human brain. Developed model of cortical architecture for the unsupervised learning of motion sequence, builds upon neurophysiological knowledge about the cortical sites such as IT, MT, STS and specific neuronal representation which contribute to articulated motion perception. Experiments show how the model automatically selects significant motion patterns as well as meaningful static snapshot categories from continuous video input. Such key poses correspond to articulated postures which are utilized in probing the trained network to impose implied motion perception from static views. We also present how sequence selective representations are learned in STS by fusing snapshot and motion input and how learned feedback connections enable making predictions about future input sequence. Network simulations demonstrate the computational capacity of the proposed model for motion recognition.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.